Results 61 to 70 of about 615,663 (220)
Generic Construction of Dual-Server Public Key Authenticated Encryption With Keyword Search
In this paper, we propose a generic construction of dual-server public key authenticated encryption with keyword search (DS-PAEKS) from PAEKS, public key encryption, and signatures.
Keita Emura
doaj +1 more source
Data security and privacy concerns are important issues in cloud storage. In this paper, we propose a verifiable public key encryption with keyword search based on homomorphic encryption in multi-user setting.
Wu Daini, Qingqing Gan, Xiaoming Wang
semanticscholar +1 more source
A Multivariate Public Key Encryption Scheme With Equality Test
The public key encryption with equality test (PKEET) allows the cloud server to judge whether two different ciphertexts are generated by the same message without decryption. Through this technique, PKEET provides an effective solution for building secure
Xiaoying Shen +3 more
doaj +1 more source
Quantum Random Oracle Model for Quantum Public-Key Encryption
Random oracle model is a general security analysis tool for rigorous security proof and effective cryptographic protocol design. In the quantum world, the attempts of constructing a quantum random oracle (QRO) have been made, such as quantum-accessible ...
Tao Shang, Ranyiliu Chen, Qi Lei
doaj +1 more source
Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage
Searchable encryption is of increasing interest for protecting the data privacy in secure searchable cloud storage. In this paper, we investigate the security of a well-known cryptographic primitive, namely, public key encryption with keyword search ...
Rongmao Chen +4 more
semanticscholar +1 more source
Poly-Dragon: an efficient multivariate public key cryptosystem
In this paper, we propose an efficient multivariate public key cryptosystem. Public key of our cryptosystem contains polynomials of total degree three in plaintext and ciphertext variables, two in plaintext variables and one in ciphertext variables ...
Singh Rajesh P., Saikia A., Sarma B. K.
doaj +1 more source
Forward-Secure Public-Key Encryption Scheme Based on SM9 [PDF]
In the traditional hybrid cryptosystem, an attacker can generate the previously used session key to decrypt session contents encrypted under the session key due to the leakage of the current private key.
HUANG Wenfeng, XU Shengmin, MA Jinhua, NING Jianting, WU Wei
doaj +1 more source
Will quantum computers be the end of public key encryption?
The emergence of practical quantum computers poses a significant threat to the most popular public key cryptographic schemes in current use. While we know that the well-understood algorithms for factoring large composites and solving the discrete ...
W. Buchanan, Alan Woodward
semanticscholar +1 more source
New security notions and relations for public-key encryption
Since their introduction, the notions of indistinguishability and non-malleability have been changed and extended by different authors to support different goals.
Sepahi Reza +3 more
doaj +1 more source
A new public key cryptosystem based on IFS [PDF]
Most public key encryption methods suffers from the inability to prove the difficulty of the algorithms, which summarizes under the category of mathematical problems that have inverses which are believed (but not proven) to be hard.
Md. Said, Mohamad Rushdan +1 more
core

